Solared INsight


About the Product

SolaredINsight goes beyond the concept of Data-Loss-Prevention to capture employee-generated traffic and apply content and behavior analytics to identify insider threat. SolaredINsight creates an interactive dossier on employees and critical data objects to provide investigation team with valuable evidence and give a bigger picture of insider threats.

SolaredINsight solves two key types of tasks.
  • When running as a traditional DLP system, SolaredINsight is capable to monitor, filter, and analyze all users’ messages for security policy violation
  • Its advanced communication analytics toolbox helps detect and investigate corporate fraud

SolaredINsight is a comprehensive solution tailored to help information security teams identify the early signs of arising insider threats that may lead to serious financial and reputational damage. SolaredINsight provides convenient tools to establish communications surveillance across the corporate network so all the captured traffic to be analyzed against the preset and configurable threat patterns.

SolaredINsight is a must-have for any organization that has

  • Business critical information and know-how
  • A need for procurement control and corruption scheme detection
  • Job positions and functions that require legitimate access to the organization's financial or other valuable assets
  • Reasonable concerns that actions of non-loyal and risk group employees are causing economic or reputational damage to the company
  • Accountability for local legislation compliance

Target audience

  • Cybersecurity teams engaged in the detection of corporate fraud, conflicts of interests, conspiracies, and direct or indirect theft of money
  • Economic and internal security teams

SolaredINsight addresses industry-specific cyber and economic security challenges in large organizations across various sectors

Banking and finance

  • Customer database leaks
  • Leaked internal security regulations
  • PAN and personal data leaks
  • Leaked marketing plans
  • Credit fraud


  • Intellectual property leaks (formulas, research)
  • Leaked clinical studies

Mining, oil & gas

  • Disclosure of proprietary information
  • Harmful hobbies of employees: browsing websites of anti-government organizations, extremists, ISIS, alternative religions, religious sects, etc.
  • Geological exploration data leaks
  • Procurement fraud
  • Leaks to the media (inside facts about accidents, waste disposal)
  • Materials fraud (fuel and lubricants, equipment and tool procurement)
  • Sabotage


  • Intellectual property leaks (drawings, designs, know-hows)
  • SCADA and PLC information leaks
  • Emergency or accident disclosures
  • Leakage of distributor terms and conditions
  • Leaked accident or waste disposal details
  • Sabotage, failure to perform job duties
  • Harmful hobbies of employees: browsing websites of anti-government organizations, extremists (e.g. ISIS), alternative religions, religious sects, etc.
  • Insider information leakage (M&As, appointments, etc.)
  • Production fraud (product scrapping, shell companies, resource use for personal benefit)
  • Receivables fraud


  • Proprietary information disclosure, selling data from government databases
  • Harmful hobbies of employees: browsing websites of WikiLeaks and the like, anti-government organizations, extremists, ISIS, alternative religions, and religious sects.
  • Corruption
  • Intelligence on organizations and their executives shared on the Internet
  • Communications with journalists
  • Keeping state secret information on employee desktops
  • Business communications in public email services, messengers, and social media
  • Personal data leaks


  • Harmful hobbies of employees: browsing websites of anti-government organizations, extremists, ISIS, alternative religions, religious sects, etc.
  • SCADA and PLC information leaks
  • Procurement fraud
  • Contracting with affiliated suppliers
  • Network upgrade plan leaks
  • Ecology and waste disposal information leaks


  • Procurement-related bribery: collusion between buyers/merchandisers and suppliers/manufacturers
  • Logistics route leaks
  • Receivables fraud
  • Leakage of new store opening plans
  • Disclosure of special terms and conditions for suppliers
  • Leaked marketing plans